CYBERSECURITY RESILIENCE
|
|
- Matthew Lane
- 5 years ago
- Views:
Transcription
1 CLOSING THE IN CYBERSECURITY RESILIENCE AT U.S. GOVERNMENT AGENCIES Two-thirds of federal IT executives in a new survey say their agency s ability to withstand a cyber event, and continue to function, is moderately to highly mature. But a number of gaps in cybersecurity resilience remain, with 6 in 10 defense or intelligence agency IT executives and 5 at civilian agencies saying their agencies don t have all the tools and resources needed to detect and respond to cyberthreats. This new survey of IT leaders at civilian, defense and intelligence agencies explores how prepared agencies are to continue operating during an attack, the tools they re using and their top concerns and priorities. PRESENTED BY UNDERWRITTEN BY
2 1 In a new survey of federal civilian, defense and intelligence agency IT decision makers, CyberScoop & FedScoop identify: The overall resilience and preparedness of civilian and defense/intelligence agencies to recover from cyber incidents WHO WE SURVEYED FedScoop and CyberScoop conducted an online survey of qualified federal government IT, cybersecurity and mission, business or program executives. A total of 64 IT officials working for civilian agencies and 51 IT officials working for defense or intelligence agencies completed the survey. All respondents are involved either in identifying IT and network security requirements, evaluating or deciding on solutions and contractors, allocating budgets, or implementing or maintaining cybersecurity solutions. The study was completed in the first quarter of How long it takes their organizations to detect and respond to security incidents GOVERNMENT RESPONDENTS BY JOB ROLE 3 What cybersecurity tools, activities and metrics they rely on most C-suite/executive level IT decision-maker IT/network/security management IT acquisition, implementation or maintenance Mission, business or program management Other (Chief data officer, analyst, IT security strategy) 4 How frequently they conduct Blue Team / Red Team testing % 5 Their top cybersecurity investment priorities 2 34% 39% 3
3 TOP LINE FINDINGS The state of cybersecurity resilience and preparedness in federal agencies: 2 IN 3 9 IN 10 MORE THAN HALF 6 IN 10 HALF OF 7 IN federal IT executives surveyed rate their agency s cybersecurity resilience the ability to withstand a cyber event and continue to function as moderately to highly mature.... IT executives surveyed say they are very or somewhat confident that their agency will continue running as usual in the midst of a cyberattack or IT security incident.... of respondents say their organizations can respond to security incidents within 12 hours after detection.... defense or intelligence executives and half at civilian agencies say their organizations don t have all the tools and resources needed in place to meet their security objectives.... civilian executives and 4 at defense/ intelligence agencies say their agencies lack the network context to prioritize responses to vulnerabilities.... civilian executives and 5 at defense/ intelligence agencies believe the threat landscape is evolving quicker than their agency can respond. 5
4 KEY FINDINGS: CYBERSECURITY RESILIENCE About 2 in 3 federal IT executives surveyed rated their agency s cybersecurity resilience maturity the ability to absorb, recover or adapt to an attack as moderate to high. Nine in 10 federal IT executives are confident their agencies will continue running as usual in the face of a cyberattack. But a majority are only somewhat confident. CYBER RESILIENCE MATURITY (1=LEAST MATURE 5=MOST MATURE) CONFIDENCE THAT THEIR ORGANIZATION WILL CONTINUE RUNNING AS USUAL UPON THE DISCOVERY OF A CYBERATTACK OR IT SECURITY INCIDENT % 19% 27% 23% 13% LEAST MATURE MOST MATURE We can adapt and use the knowledge and experience gained from an attack to become more resilient We can recover from an incident and return all functions and services to preattack levels We can absorb an incident, continue to function and repel or isolate an attack We can detect an incident or malfunction and trigger containment procedures We have a plan and are prepared to keep services available and assets functioning in the event of a cybersecurity incident Don t know 6 Very confident Somewhat confident Not confident 73% 7
5 KEY FINDINGS: CYBERSECURITY RESILIENCE Though 2 in 3 respondents say their agency has sufficient tools and resources to identify cyberthreats, roughly half or more agree that their agencies don t have all the tools or network context they need. MY AGENCY DOESN T HAVE ALL THE TOOLS/RESOURCES NEEDED IN PLACE TO DETECT/RESPOND TO CYBERTHREATS A majority of federal IT respondents believe that their agency isn t keeping pace with evolving threats and could do more to ensure cyber resilience. THE THREAT LANDSCAPE IS EVOLVING QUICKER THAN MY AGENCY CAN RESPOND 61% % % Agree Disagree Neither agree nor disagree Agree Disagree Neither agree nor disagree MY AGENCY DOESN T HAVE THE NETWORK CONTEXT TO PRIORITIZE RESPONSES TO VULNERABILITIES/BREACHES MY ORGANIZATION COULD DO MORE IN TERMS OF CYBER RESILIENCE 4 29% %
6 KEY FINDINGS: CYBERSECURITY PREPAREDNESS Agencies currently rely on various tools and tactics to guard against cyberthreats: Only about 1 in 5 federal IT executives say their agencies conduct Blue Team / Red Team cybersecurity tests on a continuous basis. CYBERSECURITY TOOLS AND ACTIVITIES USED BLUE TEAM VULNERABILITY ASSESSMENTS Data protection Incident response Endpoint protection & asset mgmt Risk scoring/ vulnerability mgmt 4 Network monitoring & protection Patch mgmt Threat intelligence Hunting % 27% % 57% 57% 53% 49% Continually Once a year 3% Once every two years Less frequently than every two years Don t know 14% RED TEAM PENETRATION TESTS 69% % % 27% 29%
7 KEY FINDINGS: CYBERSECURITY PREPAREDNESS About 6 in 10 defense / intelligence agency executives and over half at civilian agencies say their organizations have not completed a map or blueprint of their entire network within the last six months. Most respondents say they don t have the time, budget or resources. Agencies use multiple metrics to gauge the security of their networks. Network availability is cited most by defense/ intelligence IT executives; incident response is cited most by civilian agency executives. THE LAST TIME THEIR ORGANIZATION CREATED A COMPLETE BLUEPRINT, MODEL OR MAP OF ITS ENTIRE NETWORK WHAT METRICS ARE CURRENTLY BEING USED TO MEASURE NETWORK SECURITY? Within the last month 21% DEFENSE/ INTELLIGENCE AGENCY 23% % % 3 34% 5 Within the last six months Between six months and a year ago 23% Between one and three years ago Between three and five years ago 1 Network availability Never Compliance scoring ie: FISMA, CCRI, DISA STIGS 2 FEDERAL CIVILIAN AGENCY 37% Incident response time Patch management latency Average time to resolve critical vulnerabilities 2 Number of malicious s blocked 13
8 KEY FINDINGS: CYBERSECURITY RESPONSIVENESS One-third of federal IT respondents say their agency can detect security incidents in under one hour; and more than two-thirds can do so within 12 hours. But nearly 2 in 3 civilian and nearly 3 in 4 defense/intelligence agency respondents say their agency should detect incidents in under one hour. HOW LONG IT TAKES TO DETECT SECURITY INCIDENTS IN THEIR ORGANIZATION More than half of federal IT respondents say their agency can respond to security incidents within 12 hours. But the majority believe their agency should respond to security incidents in under one hour. HOW LONG IT TAKES TO RESPOND TO SECURITY INCIDENTS IN THEIR ORGANIZATION 39% 33% 29% 33% 2 33% % 19% 4% % Under an hour Within 12 hours Within 1 day Within 1 week Under an hour Within 12 hours Within 1 day Within 1 week Within 1 month 1 month or more Don t know Within 1 month 1 month or more Don t know HOW LONG THEY THINK IT SHOULD ACTUALLY TAKE HOW LONG THEY THINK IT SHOULD ACTUALLY TAKE 73% 63% 61% 57% 14% 21% 2 27% 4% 11% 1 4% 3% 15
9 KEY FINDINGS: CYBERSECURITY RESPONSIVENESS 3 in 4 IT executives say their IT security teams focus up to half of their time responding to security incidents. Determining compliance with security polices and taking inventory of network assets also consume a significant shares of the security teams time. PORTION OF IT SECURITY TEAM S TIME FOCUSED ON DETERMINING COMPLIANCE WITH SECURITY POLICIES UP TO PORTION OF IT SECURITY TEAM S TIME FOCUSED ON RESPONDING TO SECURITY INCIDENTS 14% 21% 3 34% 4 4 UP TO UP TO % 3 PORTION OF IT SECURITY TEAM S TIME FOCUSED ON TAKING INVENTORY OF NETWORK ASSETS % 27% % 4 47% 17
10 TOP INVESTMENT PRIORITIES Looking ahead: Data and network protection top the list of investment priorities for civilian and defense/intelligence agency executives. Civilian agency executives are giving threat intelligence and endpoint/asset management investments higher priority than their defense/intelligence counterparts. 59% 57% 4 39% Network monitoring & protection Data protection Incident response Risk scoring/ vulnerability management Data protection Network monitoring & protection Threat intelligence Incident response Patch management Endpoint protection & asset management Threat intelligence Hunting Endpoint protection & asset management Risk scoring/ vulnerability management Patch management Hunting 39% 37% % 31% 19
11 TOP OBSTACLES Executives rank competing IT priorities, a lack of cross-system visibility, extensive security requirements and inadequate automation among their top obstacles to detecting and responding to cybersecurity incidents. A shortage of skilled cybersecurity professionals, a lack of training or understanding of existing capabilities and insufficient automation continue to hinder cybersecurity efforts. TOP OBSTACLES THAT PREVENT ADEQUATE DETECTION AND RESPONSE TO CYBERSECURITY INCIDENTS IN THEIR ORGANIZATION TOP PERSONNEL OBSTACLES TO CYBERSECURITY IN THEIR ORGANIZATION % 41% 41% 39% 37% 29% % % 44% 2 We have too many IT priorities competing for funding Cybersecurity requirements such as FISMA compliance, NIST guidelines, DOD STIG configuration or commercial security standards take a long time to implement and check Lack of integrated visibility across all IT security systems Incomplete real-time visibility of network configuration and potential risk points Not enough skilled cybersecurity professionals in our organization Staff lack training to use and optimize the cybersecurity tools we have Difficulty retaining skilled cybersecurity professionals Cybersecurity activities are not adequately automated Cybersecurity tools do not prioritize threats to help us focus attention on the areas of highest risk Insufficient automation slows down productivity Staff do not fully understand the capabilities and benefits of the tools we have Other (Lack of staff/trained personnel/understanding app behavior) 21
12 CONCLUSIONS CYBER INCIDENT RESPONSE CYBERSECURITY RESILIENCE EVOLVING THREAT LANDSCAPE OBSTACLES AND PRIORITIES While about 2 in 3 federal IT officials claim their agency can detect cybersecurity incidents and more than half claim they can respond within 12 hours, officials stress the need for more skilled cybersecurity help to confirm there aren t deeper, undiscovered threats lurking in networks. Federal IT executives are very or somewhat confident that their agencies can absorb a cyberattack and continue to function. But more than half of civilian executives and 6 in 10 at defense/ intelligence agencies say their agencies don t have all the tools and resources needed to meet their security objectives. The majority of IT executives believe the threat landscape is evolving quicker than their agencies can respond. More than 6 in 10 agreed if their agency could automate more monitoring and mitigation activities, it would be more secure. Executives are investing most heavily in fiscal 2019 into data and network protection tools and threat intelligence. But more than 3 in 4 agree there s more that their agency could do to fortify their cyber resilience. 23
13 CyberScoop is the leading media brand in the cybersecurity market. With more than 350,000 unique monthly visitors and 240,000 daily newsletter subscribers, CyberScoop reports on news and events impacting technology and security. CyberScoop reaches top cybersecurity leaders both online and in-person through our website, newsletter, events, radio and TV to engage a highly targeted audience of cybersecurity decision makers and influencers. FedScoop is the leading tech media brand in the federal government market. With more than 210,000 unique monthly visitors and 120,000 daily newsletter subscribers, FedScoop gathers top leaders from the White House, federal agencies, academia and the tech industry to discuss ways technology can improve government and identify ways to achieve common goals. With our website, newsletter and events, we ve become the community s go-to platform for education and collaboration. Learn more about RedSeal Contact: Wyatt Kash Sr. Vice President, Content Strategy Scoop News Group Wyatt.Kash@FedScoop.com PRESENTED BY UNDERWRITTEN BY
CLOSING IN FEDERAL ENDPOINT SECURITY
CLOSING IN FEDERAL ENDPOINT SECURITY More than half of agency IT officials worry about cyberattacks involving endpoint devices as a means of accessing agency networks. Yet many aren t taking advantage
More informationMOVING MISSION IT SERVICES TO THE CLOUD
MOVING MISSION IT SERVICES TO THE CLOUD About half of civilian agency IT officials report they are now implementing mission support and business systems in the cloud. But a new progress report also highlights
More informationHOW IT INVESTMENT STRATEGIES HELP AND HINDER GOVERNMENT S ADOPTION OF CLOUD & AI
HOW IT INVESTMENT STRATEGIES HELP AND HINDER GOVERNMENT S ADOPTION OF CLOUD & AI Federal agencies have made significant strides in adopting cloud technologies. But a new survey of government IT leaders
More informationIT Risk & Compliance Federal
Dell UnisysSoftware Modernization Revolution Survey IT Risk & Compliance Federal Summary Report PulsePoll Results September 2017 JULY 10, 2014 RESPONDENT CLASSIFICATIONS 2 Current Employer From June 19,
More informationCyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK.
Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK. In today s escalating cyber risk environment, you need to make sure you re focused on the right priorities by
More informationTodd Sander Vice President, Research e.republic Inc.
Todd Sander Vice President, Research e.republic Inc. Tsander@erepublic.com Report Background Respondent Type Breakdown Received responses from 74 state elected and appointed officials and 29 staff members
More informationCyber Resilience. Think18. Felicity March IBM Corporation
Cyber Resilience Think18 Felicity March 1 2018 IBM Corporation Cyber Resilience Cyber Resilience is the ability of an organisation to maintain its core purpose and integrity during and after a cyber attack
More informationDisaster Unpreparedness June 3, 2013
Disaster Unpreparedness June 3, 2013 Underwritten by: Introduction Government relies on data and information to deliver mission success. Data loss means more than files simply missing from a database it
More informationPedal to the Metal: Mitigating New Threats Faster with Rapid Intel and Automation
Pedal to the Metal: Mitigating New Threats Faster with Rapid Intel and Automation Date: November 14, 2016 Underwritten by: Introduction Agencies deal with a greater volume and velocity of cyber threats
More informationBUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE
BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE 1 WHAT IS YOUR SITUATION? Excel spreadsheets Manually intensive Too many competing priorities Lack of effective reporting Too many consultants Not
More informationTHE CYBERSECURITY LITERACY CONFIDENCE GAP
CONFIDENCE: SECURED WHITE PAPER THE CYBERSECURITY LITERACY CONFIDENCE GAP ADVANCED THREAT PROTECTION, SECURITY AND COMPLIANCE Despite the fact that most organizations are more aware of cybersecurity risks
More informationInsider Threat Detection Including review of 2017 SolarWinds Federal Cybersecurity Survey
Insider Threat Detection Including review of 2017 SolarWinds Federal Cybersecurity Survey CyberMaryland Conference 2017 Bob Andersen, Sr. Manager Federal Sales Engineering robert.andersen@solarwinds.com
More informationMapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective
Mapping Your Requirements to the NIST Cybersecurity Framework Industry Perspective 1 Quest has the solutions and services to help your organization identify, protect, detect, respond and recover, better
More informationCyber Security in Timothy Brown Dell Fellow and CTO Dell Security
Cyber Security in 2016 Timothy Brown Dell Fellow and CTO Dell Security 2016 The middle of a perfect storm Technology Driving Innovation Advanced Adversaries Limited Resources Dell Secureworks Underground
More informationTHE POWER OF TECH-SAVVY BOARDS:
THE POWER OF TECH-SAVVY BOARDS: LEADERSHIP S ROLE IN CULTIVATING CYBERSECURITY TALENT SHANNON DONAHUE DIRECTOR, INFORMATION SECURITY PRACTICES 1 IT S A RISK-BASED WORLD: THE 10 MOST CRITICAL UNCERTAINTIES
More informationThe Deloitte-NASCIO Cybersecurity Study Insights from
The Deloitte-NASCIO Cybersecurity Study Insights from 2010-2016 August 21, 2018 Srini Subramanian State Government Sector Leader Deloitte Erik Avakian CISO Pennsylvania Michael Roling CISO Missouri Meredith
More informationEnhancing the Cybersecurity of Federal Information and Assets through CSIP
TECH BRIEF How BeyondTrust Helps Government Agencies Address Privileged Access Management to Improve Security Contents Introduction... 2 Achieving CSIP Objectives... 2 Steps to improve protection... 3
More information10 Cybersecurity Questions for Bank CEOs and the Board of Directors
4 th Annual UBA Bank Executive Winter Conference February, 2015 10 Cybersecurity Questions for Bank CEOs and the Board of Directors Dr. Kevin Streff Founder, Secure Banking Solutions 1 Board of Directors
More informationFlorida Government Finance Officers Association. Staying Secure when Transforming to a Digital Government
Florida Government Finance Officers Association Staying Secure when Transforming to a Digital Government Agenda Plante Moran Introductions Technology Pressures and Challenges Facing Government Technology
More informationSOLUTION BRIEF esentire Risk Advisory and Managed Prevention (RAMP)
SOLUTION BRIEF esentire Risk Advisory and Managed Prevention (RAMP) Adaptive Cybersecurity at the Speed of Your Business Attackers Evolve. Risk is in Constant Fluctuation. Security is a Never-ending Cycle.
More informationBuilding a Threat Intelligence Program
WHITE PAPER Building a Threat Intelligence Program Research findings on best practices and impact www. Building a Threat Intelligence Program 2 Methodology FIELD DATES: March 30th - April 4th 2018 351
More informationDATA SHEET RSA NETWITNESS PLATFORM PROFESSIONAL SERVICES ACCELERATE TIME-TO-VALUE & MAXIMIZE ROI
DATA SHEET RSA NETWITNESS PLATFORM PROFESSIONAL SERVICES ACCELERATE TIME-TO-VALUE & MAXIMIZE ROI EXECUTIVE SUMMARY The shortage of cybersecurity skills Organizations continue to face a shortage of IT skill
More informationFederal Continuous Monitoring Working Group. March 21, DOJ Cybersecurity Conference 2/8/2011
Federal Continuous Monitoring Working Group March 21, 2011 DOJ Cybersecurity Conference 2/8/2011 4/12/2011 Why Continuous Monitoring? Case for Change Strategy Future State Current State Current State Case
More informationKNOWLEDGE GAPS: AI AND MACHINE LEARNING IN CYBERSECURITY. Perspectives from U.S. and Japanese IT Professionals
KNOWLEDGE GAPS: AI AND MACHINE LEARNING IN CYBERSECURITY Perspectives from U.S. and ese IT Professionals Executive Summary The use of artificial intelligence (AI) and machine learning (ML) in cybersecurity
More informationDepartment of Management Services REQUEST FOR INFORMATION
RESPONSE TO Department of Management Services REQUEST FOR INFORMATION Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring, and Restoration Services September 3, 2015 250 South President
More informationEFFECTIVE INCIDENT RESPONSE
ONLINE REPORT SPONSORED BY: Special Report: Incident Response EFFECTIVE INCIDENT RESPONSE INSIDE P2 PREPARATION IS ESSENTIAL P3 CHOOSE THE SERVICE APPROACH TO INCIDENT RESPONSE P4 ADOPT A MULTI- PRONGED
More informationPONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY
PONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY Benchmark research sponsored by Raytheon. Independently conducted by Ponemon Institute LLC. February 2018 2018 Study on
More informationTripwire State of Cyber Hygiene Report
RESEARCH Tripwire State of Cyber Hygiene Report August 2018 FOUNDATIONAL CONTROLS FOR SECURITY, COMPLIANCE & IT OPERATIONS When a high-profile cyberattack grabs the headlines, your first instinct may be
More informationNERC CIP VERSION 6 BACKGROUND COMPLIANCE HIGHLIGHTS
NERC CIP VERSION 6 COMPLIANCE BACKGROUND The North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) Reliability Standards define a comprehensive set of requirements
More informationDeveloping a Model for Cyber Security Maturity Assessment
Developing a Model for Cyber Security Maturity Assessment Tariq Al-idrissi, Associate Vice President IT, Trent University Ian Thomson, Information Security Officer, Trent University June 20 th, 2018 (8:45am
More informationWhite Paper. View cyber and mission-critical data in one dashboard
View cyber and mission-critical data in one dashboard Table of contents Rising cyber events 2 Mitigating threats 2 Heighten awareness 3 Evolving the solution 5 One of the direct benefits of the Homeland
More informationEvaluating Cybersecurity Coverage A Maturity Model. Presented to: ISACA Charlotte Chapter Vision for IT Audit 2020 Symposium
Discussion on: Evaluating Cybersecurity Coverage A Maturity Model Presented to: ISACA Charlotte Chapter Vision for IT Audit 2020 Symposium By: Eric C. Lovell PricewaterhouseCoopers LLP ( PwC ) March 24,
More informationCyber Attacks & Breaches It s not if, it s When
` Cyber Attacks & Breaches It s not if, it s When IMRI Team Aliso Viejo, CA Trusted Leader with Solution Oriented Results Since 1992 Data Center/Cloud Computing/Consolidation/Operations 15 facilities,
More informationDEVELOP YOUR TAILORED CYBERSECURITY ROADMAP
ARINC cybersecurity solutions DEVELOP YOUR TAILORED CYBERSECURITY ROADMAP Getting started is as simple as assessing your baseline THE RIGHT CYBERSECURITY SOLUTIONS FOR YOUR UNIQUE NEEDS Comprehensive threat
More informationEvaluating and Improving Cybersecurity Capabilities of the Electricity Critical Infrastructure
Evaluating and Improving Cybersecurity Capabilities of the Electricity Critical Infrastructure March 2015 Pamela Curtis Dr. Nader Mehravari Katie Stewart Cyber Risk and Resilience Management Team CERT
More informationSkybox Security Vulnerability Management Survey 2012
Skybox Security Vulnerability Management Survey 2012 Notice: This document contains a summary of the responses to a June 2012 survey of 100 medium to large enterprise organizations about their Vulnerability
More informationAutomating the Top 20 CIS Critical Security Controls
20 Automating the Top 20 CIS Critical Security Controls SUMMARY It s not easy being today s CISO or CIO. With the advent of cloud computing, Shadow IT, and mobility, the risk surface area for enterprises
More informationBalancing Compliance and Operational Security Demands. Nov 2015 Steve Winterfeld
Balancing Compliance and Operational Security Demands Nov 2015 Steve Winterfeld What is more important? Compliance with laws / regulations Following industry best practices Developing a operational practice
More informationCybersecurity Presidential Policy Directive Frequently Asked Questions. kpmg.com
Cybersecurity Presidential Policy Directive Frequently Asked Questions kpmg.com Introduction On February 12, 2013, the White House released the official version of the Presidential Policy Directive regarding
More informationVulnerability Assessments and Penetration Testing
CYBERSECURITY Vulnerability Assessments and Penetration Testing A guide to understanding vulnerability assessments and penetration tests. OVERVIEW When organizations begin developing a strategy to analyze
More informationInformation Security Continuous Monitoring (ISCM) Program Evaluation
Information Security Continuous Monitoring (ISCM) Program Evaluation Cybersecurity Assurance Branch Federal Network Resilience Division Chad J. Baer FNR Program Manager Chief Operational Assurance Agenda
More informationICBA Summary of FFIEC Cybersecurity Assessment Tool (May 2017 Update)
ICBA Summary of FFIEC Cybersecurity Assessment Tool (May 2017 Update) June 2017 INSERT YEAR HERE Contact Information: Jeremy Dalpiaz AVP, Cyber and Data Security Policy Jeremy.Dalpiaz@icba.org ICBA Summary
More informationGaps in Resources, Risk and Visibility Weaken Cybersecurity Posture
February 2019 Challenging State of Vulnerability Management Today: Gaps in Resources, Risk and Visibility Weaken Cybersecurity Posture In the last two years, businesses and governments have seen data breaches
More informationTHALES DATA THREAT REPORT
2018 THALES DATA THREAT REPORT Trends in Encryption and Data Security U.S. FEDERAL EDITION EXECUTIVE SUMMARY #2018DataThreat THE TOPLINE Federal agency data is under siege. Over half of all agency IT security
More informationIT Security: Managing a New Reality
IT Security: Managing a New Reality Kevin Lonergan #IDCDirections IDC You re Only as Strong as Your Weakest Link Locks Only Work if you Know How to Use Them IDC 2 Millions Canadian Security Market Forecast:
More informationState Governments at Risk: State CIOs and Cybersecurity. CSG Cybersecurity and Privacy Policy Academy November 2, 2017
State Governments at Risk: State CIOs and Cybersecurity CSG Cybersecurity and Privacy Policy Academy November 2, 2017 About NASCIO National association representing state chief information officers and
More informationDom Nessi Burns Engineering March 29, 2017 CYBERSECURITY TRENDS 2017 REPORT
Dom Nessi Burns Engineering March 29, 2017 CYBERSECURITY TRENDS 2017 REPORT TOPICS Recent Cybersecurity News Past Cybersecurity News Role of Cybersecurity Major Trends Featured Speakers Matthew Dahl, Manager-Global
More informationMastering The Endpoint
Organizations Find Value In Integrated Suites GET STARTED Overview In the face of constantly evolving threat vectors, IT security decision makers struggle to manage endpoint security effectively. More
More informationALIGNING CYBERSECURITY AND MISSION PLANNING WITH ADVANCED ANALYTICS AND HUMAN INSIGHT
THOUGHT PIECE ALIGNING CYBERSECURITY AND MISSION PLANNING WITH ADVANCED ANALYTICS AND HUMAN INSIGHT Brad Stone Vice President Stone_Brad@bah.com Brian Hogbin Distinguished Technologist Hogbin_Brian@bah.com
More informationSYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security
SYMANTEC: SECURITY ADVISORY SERVICES Symantec Security Advisory Services The World Leader in Information Security Knowledge, as the saying goes, is power. At Symantec we couldn t agree more. And when it
More informationOperationalizing Cybersecurity in Healthcare IT Security & Risk Management Study Quantitative and Qualitative Research Program Results
Operationalizing Cybersecurity in Healthcare - - 2017 IT Security & Risk Management Study Quantitative and Qualitative Research Program Results David S. Finn, CISA, CISM, CRISC Health IT Officer, Symantec
More informationHow to Underpin Security Transformation With Complete Visibility of Your Attack Surface
How to Underpin Security Transformation With Complete Visibility of Your Attack Surface YOU CAN T SECURE WHAT YOU CAN T SEE There are many reasons why you may be considering or engaged in a security transformation
More informationwhitepaper How to Measure, Report On, and Actually Reduce Vulnerability Risk
whitepaper How to Measure, Report On, and Actually Reduce Vulnerability Risk Assure the board your company won t be the next data breach Introduction A solid vulnerability management program is critical
More informationINFORMATION ASSURANCE DIRECTORATE
National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS Risk Monitoring Risk Monitoring assesses the effectiveness of the risk decisions that are made by the Enterprise.
More informationTripwire State of Container Security Report
RESEARCH Tripwire State of Container Security Report January 2019 FOUNDATIONAL CONTROLS FOR SECURITY, COMPLIANCE & IT OPERATIONS As DevOps continues to drive increased use of containers, security teams
More informationRocky Mountain Cyberspace Symposium 2018 DoD Cyber Resiliency
Rocky Mountain Cyberspace Symposium 2018 DoD Cyber Resiliency Mr. Ed Brindley Acting Deputy Cyber Security Department of Defense 7 March 2018 SUPPORT THE WARFIGHTER 2 Overview Secretary Mattis Priorities
More informationPA TechCon. Cyber Wargaming: You ve been breached: Now what? April 26, 2016
PA TechCon Cyber Wargaming: You ve been breached: Now what? April 26, 2016 Cyber attacks are on the rise $3.79M The average cost of a cyber incident [1] o f i n c i d e n t s 15% s t i l l t a k e d a
More informationCybersecurity 2016 Survey Summary Report of Survey Results
Introduction In 2016, the International City/County Management Association (ICMA), in partnership with the University of Maryland, Baltimore County (UMBC), conducted a survey to better understand local
More informationThe State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016 Identifying Cybersecurity Gaps to Rethink State of the Art Executive Summary Executive Summary While the advent of digital technology has fueled new business
More informationDIGITAL TRANSFORMATION IN FINANCIAL SERVICES
DIGITAL TRANSFORMATION IN FINANCIAL SERVICES Global Priorities, Progress, and Obstacles Insights from business and IT executives at financial services institutions worldwide reveal that while digital transformation
More informationPAIN AND PROGRESS THE RSA CYBERSECURITY AND BUSINESS RISK STUDY
WHITEPAPER PAIN AND PROGRESS THE RSA CYBERSECURITY AND BUSINESS RISK STUDY CONTENTS Executive Summary........................................ 3 The Cybersecurity and Business Risk Survey..........................
More informationDATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE
DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE EXECUTIVE SUMMARY ALIGNING CYBERSECURITY WITH RISK The agility and cost efficiencies
More informationU.S. Department of Homeland Security Office of Cybersecurity & Communications
U.S. Department of Homeland Security Office of Cybersecurity & Communications Council of State Governments Cybersecurity Session November 3, 2017 Cybersecurity & Communications (CS&C) CS&C s Mission ensure
More informationFTA 2017 SEATTLE. Cybersecurity and the State Tax Threat Environment. Copyright FireEye, Inc. All rights reserved.
FTA 2017 SEATTLE Cybersecurity and the State Tax Threat Environment 1 Agenda Cybersecurity Trends By the Numbers Attack Trends Defensive Trends State and Local Intelligence What Can You Do? 2 2016: Who
More informationSecurity Survey Executive Summary October 2008
A government technology Executive Survey Summary: HP Security Survey Executive Summary October 2008 Produced by: In Partnership With: Introduction Information is paramount to the survival of government
More informationIMPROVING NETWORK SECURITY
IMPROVING NETWORK SECURITY How AN Information Assurance Professional Assessment HELPED THE The City of Stow, Ohio is a community of just under 35,000 people, located 35 miles south of Cleveland and part
More informationMay 14, :30PM to 2:30PM CST. In Plain English: Cybersecurity and IT Exam Expectations
May 14, 2018 1:30PM to 2:30PM CST In Plain English: Cybersecurity and IT Exam Expectations Options to Join Webinar and audio Click on the link: https://www.webcaster4.com/webcast/page/584/24606 Choose
More informationMust Have Items for Your Cybersecurity or IT Budget in 2018
Must Have Items for Your Cybersecurity or IT Budget in 2018 CBAO Regional Meeting Dan Desko (Senior Manager, IT Risk Advisory) Matt Dunn (Senior Security Analyst, IT Risk Advisory) Who is Schneider Downs?
More informationToday s cyber threat landscape is evolving at a rate that is extremely aggressive,
Preparing for a Bad Day The importance of public-private partnerships in keeping our institutions safe and secure Thomas J. Harrington Today s cyber threat landscape is evolving at a rate that is extremely
More informationInnovate or die!? Modern IT Workplace Security. Alex Verboon Cyber Security Consultant
1 Innovate or die!? Modern IT Workplace Security Alex Verboon Cyber Security Consultant Alex.verboon@basevision.ch Daniel Buehlmann Principal Workplace Consultant daniel.buehlmann@basevision.ch About Alex
More informationIBM Security Systems. IBM X-Force 2012 & CISO Survey. Cyber Security Threat Landscape IBM Corporation IBM Corporation
IBM X-Force 2012 & CISO Survey Cyber Security Threat Landscape 1 2012 IBM Corporation IBM X-Force 2011 Trend and Risk Report Highlights The mission of the IBM X-Force research and development team is to:
More informationCyber Resilience - Protecting your Business 1
Cyber Resilience - Protecting your Business 1 2 Cyber Resilience - Protecting your Business Cyber Resilience - Protecting your Business 1 2 Cyber Resilience - Protecting your Business Cyber Resilience
More informationSecurity Monitoring. Managed Vulnerability Services. Managed Endpoint Protection. Platform. Platform Managed Endpoint Detection and Response
Security Operations Flexible and Scalable Solutions to Improve Your Security Capabilities Security threats continue to rise each year and are increasing in sophistication and malicious intent. Unfortunately,
More informationSecurity in Today s Insecure World for SecureTokyo
Security in Today s Insecure World for SecureTokyo David Shearer (ISC) 2 Chief Executive Officer dshearer@isc2.org www.isc2.org I m Influenced by a Mission Driven Background U.S. Maritime Transportation
More informationWhat It Takes to be a CISO in 2017
What It Takes to be a CISO in 2017 Doug Copley Deputy CISO Sr. Security & Privacy Strategist February 2017 IMAGINE You re the CISO In Bangladesh Of a bank On a Friday when you re closed You realize 6 huge
More informationEnsuring System Protection throughout the Operational Lifecycle
Ensuring System Protection throughout the Operational Lifecycle The global cyber landscape is currently occupied with a diversity of security threats, from novice attackers running pre-packaged distributed-denial-of-service
More information2018 GLOBAL CHANNEL PARTNER SURVEY THYCOTIC CHANNEL PARTNER SURVEY REPORT
2018 GLOBAL CHANNEL PARTNER SURVEY THYCOTIC CHANNEL PARTNER SURVEY REPORT THYCOTIC 2018 GLOBAL CHANNEL PARTNER SURVEY Channel Partner survey highlights client cybersecurity concerns and opportunities for
More informationSecurity Hygiene. Be in a defensible position. Be cyber resilient. November 8 th, 2017
Security Hygiene Be in a defensible position. Be cyber resilient. November 8 th, 2017 Agenda Getting defensive How will we do it? Basic hygiene stuff Getting started Questions Introductions Over 20 years
More informationFundamental Shift: A LOOK INSIDE THE RISING ROLE OF IT IN PHYSICAL ACCESS CONTROL
Fundamental Shift: A LOOK INSIDE THE RISING ROLE OF IT IN PHYSICAL ACCESS CONTROL Shifting budgets and responsibilities require IT and physical security teams to consider fundamental change in day-to-day
More informationTEL2813/IS2820 Security Management
TEL2813/IS2820 Security Management Security Management Models And Practices Lecture 6 Jan 27, 2005 Introduction To create or maintain a secure environment 1. Design working security plan 2. Implement management
More informationTechnical Conference on Critical Infrastructure Protection Supply Chain Risk Management
Technical Conference on Critical Infrastructure Protection Supply Chain Risk Management Remarks of Marcus Sachs, Senior Vice President and the Chief Security Officer North American Electric Reliability
More informationCyber Security Program
Cyber Security Program Cyber Security Program Goals and Objectives Goals Provide comprehensive Security Education and Awareness to the University community Build trust with the University community by
More informationCyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS
Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS Continual disclosed and reported
More information2016 Nationwide Cyber Security Review: Summary Report. Nationwide Cyber Security Review: Summary Report
Nationwide Cyber Security Review: Summary Report Nationwide Cyber Security Review: Summary Report ii Nationwide Cyber Security Review: Summary Report Acknowledgments The Multi-State Information Sharing
More informationThink Oslo 2018 Where Technology Meets Humanity. Oslo. Felicity March Cyber Resilience - Europe
Think Oslo 2018 Where Technology Meets Humanity Oslo Felicity March Cyber Resilience - Europe Cyber Resilience Cyber Resilience is the ability of an organisation to maintain its core purpose and integrity
More informationDepartment of Defense Cybersecurity Requirements: What Businesses Need to Know?
Department of Defense Cybersecurity Requirements: What Businesses Need to Know? Why is Cybersecurity important to the Department of Defense? Today, more than ever, the Department of Defense (DoD) relies
More informationRSA Cybersecurity Poverty Index
RSA Cybersecurity Poverty Index 2016 RSA Cybersecurity Poverty Index Overview Welcome to RSA s second annual Cybersecurity Poverty Index. The RSA Cybersecurity Poverty Index is the result of an annual
More informationBusiness continuity management and cyber resiliency
Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed member of Baker Tilly International. Business continuity management and cyber resiliency Introductions Eric Wunderlich,
More informationAre we breached? Deloitte's Cyber Threat Hunting
Are we breached? Deloitte's Cyber Threat Hunting Brochure / report title goes here Section title goes here Have we been breached? Are we exposed? How do we proactively detect an attack and minimize the
More informationMitigating Risk with Ongoing Cybersecurity Risk Assessment. Scott Moser CISO Caesars Entertainment
Mitigating Risk with Ongoing Cybersecurity Risk Assessment Scott Moser CISO Caesars Entertainment CSO50 Presentation Caesars Entertainment Cybersecurity Risk Management Scott Moser Chief Information Security
More informationCanada Highlights. Cybersecurity: Do you know which protective measures will make your company cyber resilient?
Canada Highlights Cybersecurity: Do you know which protective measures will make your company cyber resilient? 21 st Global Information Security Survey 2018 2019 1 Canada highlights According to the EY
More informationThe Third Annual Study on the Cyber Resilient Organization
The Third Annual Study on the Cyber Resilient Organization Global Independently conducted by the Ponemon Institute Sponsored by IBM Resilient Publication Date: March 2018 Ponemon Institute Research Report
More informationInstitute of Internal Auditors 2019 CONNECT WITH THE IIA CHICAGO #IIACHI
Institute of Internal Auditors 2019 CONNECT WITH THE IIA CHICAGO CHAPTER: @IIACHI #IIACHI WWW.FACEBOOK.COM/IIACHICAGO HTTPS://WWW.LINKEDIN.COM/GROUPS/1123977 1 CAE Communications and Common Audit Committee
More informationTraining and Certifying Security Testers Beyond Penetration Testing
Training and Certifying Security Testers Beyond Penetration Testing Randall W. Rice, CTAL (Full), CTAL-SEC Director, ASTQB Board of Directors www.astqb.org Most organizations do not know the true status
More informationUNCLASSIFIED. FY 2016 Base FY 2016 OCO
Exhibit R-2, RDT&E Budget Item Justification: PB 2016 Office of the Secretary Of Defense : February 2015 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 7: Operational Systems Development
More informationSECOND ANNUAL. Small & Medium Business Trends Report Research insights from nearly 500 business owners and leaders
SECOND ANNUAL Small & Medium Business Trends Report Research insights from nearly 500 business owners and leaders Introduction Welcome to the second annual Small & Medium Business Trends Report. Small
More informationK12 Cybersecurity Roadmap
K12 Cybersecurity Roadmap Introduction Jason Brown, CISSP Chief Information Security Officer Merit Network, Inc jbrown@merit.edu @jasonbrown17 https://linkedin.com/in/jasonbrown17 2 Agenda 3 Why Use the
More informationContinuously Discover and Eliminate Security Risk in Production Apps
White Paper Security Continuously Discover and Eliminate Security Risk in Production Apps Table of Contents page Continuously Discover and Eliminate Security Risk in Production Apps... 1 Continuous Application
More informationWhich Side Are You On?
12/9/2015 ARE YOU THE NEXT CYBER WARRIOR? Maria S. Thompson State Chief Risk/Security Officer Which Side Are You On? 8/17/2015 2 Information Technology 2 1 Cyber Professionals Deficiency Statistics Cybersecurity
More informationWhat Does the Future Look Like for Business Continuity Professionals?
What Does the Future Look Like for Business Continuity Professionals? October 26, 2016 Brian Zawada, FBCI President, US Chapter of the Business Continuity Institute Agenda and Objectives Change Standards
More information